Cybersecurity.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Computer Viruses.
Threats To A Computer Network
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber Crimes.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Viruses & Destructive Programs
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Topic 5: Basic Security.
 Malicious Code  Hacking  Natural Disaster  Theft.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
What they are and how to protect against them
Cybersecurity.
Malware and Computer Maintenance
3.6 Fundamentals of cyber security
CYBER SECURITY...
Social Engineering Charniece Craven COSC 316.
Big Picture Consider this How many online threats might you be faced with a day?
Instructor Materials Chapter 7 Network Security
National Cyber Security Month
CHAPTER 6 – BASIC SECURITY
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Teaching Computing to GCSE
Computer Applications Unit B
Cybersecurity Awareness
Risk of the Internet At Home
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
Staying safe on the internet
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
How to keep the bad guys out and your data safe
King Saud University- College OF Applied Studies
Internet Safety – Social Media
Computer Security By: Muhammed Anwar.
WJEC GCSE Computer Science
Security in mobile technologies
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Cybersecurity

Technical Classifications Malware Short for malicious software, is any software used to disrupt computer or mobile device operations. Technical Classifications Virus Code that self-replicates by infecting a devices existing programs and files, and then spreading to other computers via shared files. Worm Standalone program that spreads by utilizing network vulnerabilities to reach and install itself on other devices connected to that network. Standalone program that typically doesn’t self-replicate and instead spreads by tricking users into voluntarily installing it for an intended purpose without knowing it is malware. Trojan

Malware Objectives Spyware Adware Scareware Open virtual doors to or control devices on private computer systems Collect and transmit sensitive information Vandalize systems by slowing down, manipulating or deleting its data Adware Display unwanted advertising, often in un-closable windows Scareware Threaten users to make them take a desired action

Social Engineering How likely are you to pick it up? 40% of Millennials 22% of Gen X 9% of Baby Boomers. At least 20% will be plugged in Payroll Backup

Social Engineering Scareware Rogue security software Ransomware Software engineered to cause shock, anxiety, or the perception of a threat in order to manipulate users into paying for access to their device unwanted software. Rogue security software Non-functional or Trojan horse malware purchased to resolve the detection of a fake virus Ransomware Malware that encrypts a users files and then requires payment to have them decrypted.

Social Engineering Phishing Email Texts Phone Calls Websites Attempt to obtain sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication, often executed on a large-scale. Email Spam messages such as The Nigerian Prince Texts “Reply with Stop” messages used to confirm validity of phone numbers Phone Calls Simply answering or voicemail prompt confirms the validity of the number and often the owner’s name Websites Fake discounts or software offers used to trick users into providing registration/login information likely used on other sites as well. Social Media – Catfishing Creation of a fake social network profile to engage with other users, often with romantic undertones, for nefarious purposes. Video about Email Phishing

Social Engineering Spoofing Email Spoofing Website Spoofing A situation in which a person or program successfully masquerades as another by falsifying data Email Spoofing Technique commonly used by spammers to hide the origin of their e-mails by faking an emails “From” information to make it appear to be from a trusted source Website Spoofing A hoax site designed to mislead visitors into thinking it is a known, trusted site to collect user information, particularly login credentials for the mimicked site. A specific form of phishing

Password Cracking Security Questions Brute-force Dictionaries A list of common passwords or passwords know to be used by a specific user, that are cycled through to attempt to gain access to a users account on a new site. Security Questions Using security questions to reset a user’s password and gain access to their account. How may of these can be answered by all of your Facebook friends? Who is your favorite actor, musician, or artist? What is the name of your favorite pet? In what city were you born? What high school did you attend? What is your mother's maiden name? When is your anniversary? What was your high school mascot? Brute-force Attempting every alpha-numeric combination possible to guess a user’s password. Time consuming and easily stopped by most sites. Just lowercase letters for a 7 character password is 267, 8,031,810,176 possible combinations email@gmail.com  1234 baseball 1234567 Dictionaries - Think what would happen if a spoofing victim used the same email and password for multiple accounts.

Who and Why Cybercrimes Cyberterrorism Cyberwarfare Criminal acts perpetrated by individuals or groups using computers and networks, typically for financial gain. Piracy – Copyright Infringement Bank & Credit Card Fraud Identity Theft Blackmail Corporate Espionage Cyberterrorism Organized, large-scale use of computers, networks, and public internet to cause destruction and harm by disrupting use of networks and infrastructure systems. Cyberwarfare Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption Video about Cyberwarefare Stuxnet

Distributed Denial-of-Service (DDoS)

What can you do? Use Secure Passwords Anti-Virus Software Use strong passwords with at least 8 characters, including numbers and special characters Don’t use the same password for your primary email and any other website Enable two-step verification on primary email accounts, so you receive a verification code via text in addition to using your password. Use a Password manager, such as LastPass or Keepass to remember your passwords Anti-Virus Software Popular Options: AVG, Norton, & McAfee Make sure it is always up-to-date and running full system scans automatically on a regular basis Firewall Software Blocks unwanted network activity Most operating systems come equipped with software to block inbound traffic from external sources Blocking outbound spyware transmissions may require addition software, often an add-on offering of anti-virus software packages. Be Smart and Pay Close Attention